On Tue, 1 Aug 2006, John Rudd wrote:

> Not directly stopping spam, but helping to close holes that are 
> manipulated by spammers, and make it easier to track them:
> 
> 1) Require Virus Scanning on all SMTP transactions, on the recipient's 
> side of the transaction (ie. the "Server") (to help minimize zombie 
> PCs).  Any SMTP server which accepts a virus laden email, for which 
> their anti-virus engine already had an update for that virus, should be 
> held accountable on every level for any damage done by that virus 
> instance.  Any SMTP server which doesn't run a virus scanner would be 
> accountable for every virus that passes through their system.

Infeasible, too many players, too many technically unsophisticated
players.

> 2) Require Domain Keys on all messages

Infeasible, too many players, too many technically unsophisticated
players.

> 3) Require accurate reverse DNS records for all IP addresses in use by 
> a given IP block

Feasible and desirable, only ISPs need to be involved.

> 4a) maybe generalize #4 to include various other RFC issues (matching 
> PTR and A records is an RFC requirement, after all), such as the things 
> tracked at RFC-Ignorant

Less feasible, too many players.

How about: domain registrars are required to block any domain they
have registered that does not have working (i.e. read-by-a-human)
postmaster@ and abuse@ aliases? 

> 5) Require ISP's to channel their customer's email through their own 
> mail servers (which will have some impact upon SPF tracking as well) 
> and not allow any non-business customers, nor any dynamic customers 
> (business or commercial), to directly connect to other mail servers.

Totalitarian regimes will *love* that one. ISPs will hate it.

> 6) establish a global RBL that has 4 aspects: DNSBL (like Spamhaus), 
> URIBL (like SURBL), a Domain Key blacklist, an RFC-Ignorant type black 
> list (covering items 3, 4, and 4a above, as well as what RFC-Ignorant 
> covers now), and a blacklist of servers which don't maintain anti-virus 
> filters.

I preferred the idea of requiring ISPs to maintain DNSBLs for their
dynamic ranges. Simple and effective.

> 6a) to go with #6, an international body for reporting spam incidents, 
> which would be used to feed the RBL

Bureaucratic overhead ensures that one is a nonstarter.
 
> 6b) to go with #6a, a requirement that email clients make it "user 
> friendly" to forward messages with full/raw headers to the body in #6a

I'm reluctant to suggest lots of "requirements" (read: laws) that
dictate behavior by individuals or requirements for software vendors.
Such is too easy and tempting a target for legislative abuse - and
what legislator, anywhere, understands these technical subjects at the
level necessary to pass effective yet limited legislation?

'course, legislating requirements for ISPs is an equally slippery
slope...

--
 John Hardin KA7OHZ    ICQ#15735746    http://www.impsec.org/~jhardin/
 [EMAIL PROTECTED]    FALaholic #11174    pgpk -a [EMAIL PROTECTED]
 key: 0xB8732E79 - 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
 [Small arms] are fundamentally dangerous and their removal from the
 equation either by control, neutralisation or removal is essential.
 The first step is to gain information on their numbers and
 whereabouts.         -- the UN, who "doesn't want to confiscate guns"
-----------------------------------------------------------------------

Reply via email to